It’s ironic that the Jeff Bezos, Amazon chief executive, who heads up one of the most cyber-secure cloud architectures in the world, had his own very private data hacked and used against him. But his sloppiness about personal security provides a warning message for us all. That is, we can build the most secure, impossible-to-hack network systems, but they can’t protect us from our own stupidity—sharing very personal data over systems that aren’t so private.
Smart phones can be an asset on the plant floor, letting operators look at current plant data and make intelligent decisions. But, should personal devices be checked at the door, and are they a potential risk for cyberattacks?
We know ransomware can wipe out a business—maybe not so much from the cost of paying the ransom, but from the downtime it causes—so don’t get caught without a backup. I asked the experts whether a processor should pay the ransom, and while the responses were mixed, the moral of the story is: Have a backup!
The Department of Homeland Security National Cybersecurity and Communications Integration Center (NCCIC) and the FBI have issued an activity alert to inform all computer network system operators about SamSam ransomware—aka MSIL/Samas.A. This malware has been in circulation for some time and continues to inflict damage to systems.
A newly published standard specifies process requirements for the secure development of products used in industrial automation and control systems (IACS).
Unreported attacks may hide the extent of the challenge
January 10, 2018
Although food and agriculture cyberattacks accounted for only 2 percent of all reported critical infrastructure assessments in fiscal 2016, unreported attacks could change the picture dramatically.